Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
Source
| Journal of Information… | 3 |
Author
| Astrom, Peik | 1 |
| Bergstrom, Laura | 1 |
| Dark, Melissa Jane | 1 |
| Ekstrom, Joseph J. | 1 |
| Grahn, Kaj J. | 1 |
| Karlstrom, Krister | 1 |
| Lunt, Barry M. | 1 |
| Murray, Meg Coffin | 1 |
| Pulkkis, Goran | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 3 |
Education Level
| Higher Education | 3 |
Audience
Location
| Finland | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Dark, Melissa Jane; Ekstrom, Joseph J.; Lunt, Barry M. – Journal of Information Technology Education, 2006
In December 2001 a meeting of interested parties from fifteen four-year IT programs from the US along with representatives from IEEE, ACM, and ABET (CITC-1) began work on the formalization of Information Technology as an accredited academic discipline. The effort has evolved into SIGITE, the ACM SIG for Information Technology Education. During…
Descriptors: Intellectual Disciplines, Information Technology, Technology Education, Information Science Education
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks

Peer reviewed
Direct link
